Please use this identifier to cite or link to this item: https://repository.unej.ac.id/xmlui/handle/123456789/90471
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPrihandoko, Antonius Cahya-
dc.date.accessioned2019-04-15T03:07:38Z-
dc.date.available2019-04-15T03:07:38Z-
dc.date.issued2019-04-15-
dc.identifier.issn2503-250X-
dc.identifier.urihttp://repository.unej.ac.id/handle/123456789/90471-
dc.descriptionInformatics Journal, Vol. 3 No. 2 (2018)en_US
dc.description.abstractThis paper provides a review on traitor tracing schemes that are developed to counter piracy strategies. The review starts with a formal definition of the traitor tracing schemes. The paper is then outlined based on two main strategies which may taken by digital content pirates. Mostly the pirates have strategy to make use leaked decryption key or leaked decrypted content. For each piracy strategy, we presents traitor tracing schemes that can be used to counter the piracy. We also analysis strength and weakness of each group of the schemes. At the end of this paper, we propose to combine some schemes for better protection.en_US
dc.language.isoenen_US
dc.subjectDigital rights managementen_US
dc.subjectTraitor tracing schemesen_US
dc.subjectPiracy strategiesen_US
dc.titleTraitor Tracing Schemes: a Reviewen_US
dc.typeArticleen_US
Appears in Collections:LSP-Jurnal Ilmiah Dosen

Files in This Item:
File Description SizeFormat 
F. IK_Jurnal_Antonius CP_Traitor Tracing Schemes.pdf1.33 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.